Endpoint Security Part1: Collecting the essential security events for your windows systems By John Reeman | December 5, 2023 Posted in Detection Engineering, How To Guides, Security Insights ← Generative AI Security: Preventing Microsoft Copilot Data ExposureGetting gooey with GULOADER: deobfuscating the downloader →